no code implementations • 9 Sep 2021 • Xuanyu Duan, Mengmeng Ge, Triet H. M. Le, Faheem Ullah, Shang Gao, Xuequan Lu, M. Ali Babar
This security model automatically assesses the security of the IoT network by capturing potential attack paths.
no code implementations • 17 Dec 2020 • Bushra Sabir, Faheem Ullah, M. Ali Babar, Raj Gaire
Objective: This paper aims at systematically reviewing ML-based data exfiltration countermeasures to identify and classify ML approaches, feature engineering techniques, evaluation datasets, and performance metrics used for these countermeasures.